Monir Abdullah , Hanan Abdullah Mengash , Mohammed Maray , Faheed A.F. Alrslani , Hanadi Alkhudhayr , Nouf Atiahallah Alghanmi , Alanoud Subahi , Jihen Majdoubi
{"title":"Federated learning with Blockchain on Denial-of-Service attacks detection and classification of edge IIoT networks using Deep Transfer Learning model","authors":"Monir Abdullah , Hanan Abdullah Mengash , Mohammed Maray , Faheed A.F. Alrslani , Hanadi Alkhudhayr , Nouf Atiahallah Alghanmi , Alanoud Subahi , Jihen Majdoubi","doi":"10.1016/j.compeleceng.2025.110319","DOIUrl":null,"url":null,"abstract":"<div><div>With the rapid evolution of Internet of Things (IoT) and artificial intelligence (AI), the industry 4.0 era has arisen. As per the IBM prediction, by the constant spread of 5G technology, the IoT intend to be more extensively utilized in industries. Recently, federated learning (FL) turned out to be significant focus among Industrial IoT (IIoT) scholars. Conversely, numerous devices in IIoT presently hold an issue of low computational power, so these devices can't able to function well while challenging the updating and training method tasks in FL. The latest development of machine learning (ML) and deep learning (DL) approaches will help to reinforce these IDSs. The secrecy behaviour of these databases and extensive advent of combative outbreaks makes it challenging for main institutions to transmit their fragile data. Therefore, the current study designs a Federated Learning on Denial-of-Service Attacks Detection and Classification using Deep Transfer Learning (FLDoSADC-DTL) model for BC-supported IIoT environment. The aim of the presented FLDoSADC-DTL approach is to recognize the presence of DoS attacks in the BC-based IIoT environment. To enable secure communication in the IIoT networks, BC technology is used. To accomplish this, the FLDoSADC-DTL technique performs sand cat swarm algorithm (SCSA) based feature subset selection. For the DoS attack detection process, a stacked auto-encoder (SAE) model is utilized in this study. Finally, the black widow optimization algorithm (BWOA) can be implemented for hyperparameter tuning of the SAE technique. A widespread of experiments were performed to emphasize the higher performance of FLDoSADC-DTL method. The complete experimentation outcomes indicated the enhanced performance of FLDoSADC-DTL approach over other recent methods.</div></div>","PeriodicalId":50630,"journal":{"name":"Computers & Electrical Engineering","volume":"124 ","pages":"Article 110319"},"PeriodicalIF":4.0000,"publicationDate":"2025-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Computers & Electrical Engineering","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0045790625002629","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
With the rapid evolution of Internet of Things (IoT) and artificial intelligence (AI), the industry 4.0 era has arisen. As per the IBM prediction, by the constant spread of 5G technology, the IoT intend to be more extensively utilized in industries. Recently, federated learning (FL) turned out to be significant focus among Industrial IoT (IIoT) scholars. Conversely, numerous devices in IIoT presently hold an issue of low computational power, so these devices can't able to function well while challenging the updating and training method tasks in FL. The latest development of machine learning (ML) and deep learning (DL) approaches will help to reinforce these IDSs. The secrecy behaviour of these databases and extensive advent of combative outbreaks makes it challenging for main institutions to transmit their fragile data. Therefore, the current study designs a Federated Learning on Denial-of-Service Attacks Detection and Classification using Deep Transfer Learning (FLDoSADC-DTL) model for BC-supported IIoT environment. The aim of the presented FLDoSADC-DTL approach is to recognize the presence of DoS attacks in the BC-based IIoT environment. To enable secure communication in the IIoT networks, BC technology is used. To accomplish this, the FLDoSADC-DTL technique performs sand cat swarm algorithm (SCSA) based feature subset selection. For the DoS attack detection process, a stacked auto-encoder (SAE) model is utilized in this study. Finally, the black widow optimization algorithm (BWOA) can be implemented for hyperparameter tuning of the SAE technique. A widespread of experiments were performed to emphasize the higher performance of FLDoSADC-DTL method. The complete experimentation outcomes indicated the enhanced performance of FLDoSADC-DTL approach over other recent methods.
期刊介绍:
The impact of computers has nowhere been more revolutionary than in electrical engineering. The design, analysis, and operation of electrical and electronic systems are now dominated by computers, a transformation that has been motivated by the natural ease of interface between computers and electrical systems, and the promise of spectacular improvements in speed and efficiency.
Published since 1973, Computers & Electrical Engineering provides rapid publication of topical research into the integration of computer technology and computational techniques with electrical and electronic systems. The journal publishes papers featuring novel implementations of computers and computational techniques in areas like signal and image processing, high-performance computing, parallel processing, and communications. Special attention will be paid to papers describing innovative architectures, algorithms, and software tools.